Client Tools

TVG Consulting’s client tools provides a one stop hub where customers can get support, contact the TVG team, review company announcements & keep tabs on trending network security threats.

Support


(818) 579-7370 x200
(818) 579-7370 x300 *after hours only
support@tvgconsulting.com

Accounting


(818) 579-7370 x206

Sales


(818) 579-7370 x205
sales@tvgconsulting.com

Location


217 West Alameda Ave, Suite 102
Burbank, CA 91502

When does patching happen?

Wednesday through Saturday nights.
8:00pm – 7:00am

Why do you patch our systems and desktops?

Patch maintenance allows TVG’s IT staff to roll-out important and necessary software patches for all desktops and server within your network environment. This is mandatory for proper stability and security protection of your desktops and laptops. A reboot of the end users desktops might be required.

What are you “patching” exactly?

All Microsoft products (including Windows and Office), as well as MAC OS safe, white listed updates. We also patch all antivirus and malware protection software, as well as any needed drivers for your desktops and laptops.

As our client, nobody’s feedback is more important than yours. Use this short survey to send candid feedback to our team.

Send Your Feedback Here >>

TVG is observing the following upcoming holidays:

4th of July – Monday+Tuesday(July3rd-4th)

If you have any issues, please submit a ticket and our After Hours technician will address it. We are always watching your systems for critical issues or any down time.

  • WannaCrypt Ransomware

Also known as WannaCry, WanaCrypt0r, WCrypt, or WCRY, this ransomware attack spreads by multiple methods, including phishing emails and on unpatched Microsoft Operating systems (Windows 10 PCs not currently affected) as a computer worm. For customers with TVG’s Managed Services platform software installed on their PC’s, MAC’s and Servers, the patch for the main strain of this exploit was patched by Microsoft in March with your TVG patching deployment schedule. If you have a computer that may be at risk or are unsure, click here to visit the Microsoft page on that computer to download and update your computer security.

  • MBR & File Encryption Ransomware Strain

Satana prepends their email address to each file like this: “email@domain.com_filename.extension”. Satana then encrypts the MBR and replaces it with its own. The first time when a user reboots their workstation, Satana’s MBR boot code will load and the only thing the machine will show is Satana’s ransom note in red on black

  • Data Breach Extortion Scam

The FBI warned that internet criminalss are exploiting these data breaches by threatening to expose the victim’s personal information to their employer, friends and family using social media unless the targeted person agrees to pay a ransom in Bitcoin. The recipients are typically given a short deadline. The ransom amount ranges from 2 to 5 bitcoins or approximately 250 to 1,200 dollars.

  • Cryptolocker Ransomware

Hackers are using malicious links within advertisements and emails to download ransomware on the victim’s device and then holding the data hostage until payments are made. Once the malware is installed, it can be incredibly difficult to retrieve the data without paying the ransom. While many of these emails are filtered out, always be diligent in verifying the emails you receive are legitimate and wary of any ads on websites before clicking on them.

  • Ke Ranger Mac Ransomware

Ransomware has now invaded Macs for the first time. Mac users caught the virus through a program called Transmission–frequently used to transfer data to peer-to-peer sharing site BitTorrent. Those who downloaded Transmission instantly infected their Macs. While Apple has been diligent to resolve continued infections, be careful what you are downloading either via sites, emails or advertisements. As with any ransomware virus the hackers are holding the data hostage until payments are made. Once the malware is installed, it can be incredibly difficult to retrieve the data without paying the ransom.

  • CEO W-2 Phishing Scam

Targeting HR & Accounting Departments, the email is designed to appear as if it is directly from the CEO asking for all the employee W-2 data. Once sent, the hacker will have all employee information, including social security numbers. Per the IRS warning, check the validity of all emails, starting with the email address from which it was sent.

  • TurboTax Phishing Scam

At the moment, there is a massive phishing scam that looks like it comes from TurboTax. The email tries to make you click on a link to “opt out” of sharing your personal information with others. The email is a scam, if you click on the link it will download key logger malware which will steal your identity from your computer or phone.